Jan 26, 2015 - the network following a loop-free path. The principle assumed ..... enabling content-based routing in mobile ad hoc networks,â IEEE ... 575â585.
Design of a Novel Network Architecture for Distributed Event-Based Systems Using Directional Random Walks in an Ubiquitous Sensing Scenario
Cristina Mu˜noz and Pierre Leone
arXiv:1501.06451v1 [cs.DC] 26 Jan 2015
Department of Computer Science University of Geneva Carouge, Switzerland Email: {Cristina.Munoz, Pierre.Leone}@unige.ch
Abstract—Ubiquitous sensing devices frequently disseminate data among them. The use of a distributed event-based system that decouples publishers from subscribers arises as an ideal candidate to implement the dissemination process. In this paper, we present a network architecture that merges the network and overlay layers of typical structured event-based systems. Directional random walks are used for the construction of this merged layer. Our strategy avoids using a specific network protocol that provides point-to-point communication. This implies that the topology of the network is not maintained, so that nodes not involved in the system are able to save energy and computing resources. We evaluate the performance of the overlay layer using directional random walks and pure random walks for its construction. Our results show that directional random walks are more efficient because: (1) they use less nodes of the network for the establishment of the active path of the overlay layer and (2) they have a more reliable performance. Furthermore, as the number of nodes in the network increases, so do the number of nodes in the active path of the overlay layer for the same number of publishers and subscribers. Finally, we discard any correlation between the number of nodes that form the overlay layer and the maximum Euclidean distance traversed by the walkers. Keywords-Distributed Event-Based Systems; Overlay Layer; Directional Random Walks; Pure Random Walks; Wireless Sensor Networks.
I. I NTRODUCTION Ubiquitous or pervasive computing [1][2] uses many sources and destinations to gather and process data related to physical processes with the aim of making possible human-computer interaction. In the process of dissemination, some devices generate the data, while others are waiting for the sensing data. In this context, the use of a distributed event-based system [3] arises as an ideal candidate to implement the model of communication on the reception or transmission of events. The main characteristic of an event-based system is that publishers and subscribers are decoupled. This means that they do not have any information about each other. The element in charge of matching notifications with subscriptions is called the event notification service. In distributed networks, the event notification service is implemented using a network of brokers nodes (see Figure 1). It is considered that a broker is any node in the network that has information about any single or set of subscriptions. The complexity of designing this type of systems usually lies on the way to elect the nodes that act as brokers because of the decentralized nature of a distributed network.
Figure 1: Distributed notification service using a network of brokers.
In our research [1], we assume that a node can be a publisher, a subscriber, a broker or a combination of these three possibilities. We also assume that all the nodes in the network are able to participate in it without the requirement to adopt the specific role of publisher or subscriber. Nodes that are actively participating in the network but do not take any specific role will be considered as part of the overlay layer. Those nodes of the overlay layer that are able to redirect messages will be considered as brokers. Event-based systems are classified as topic-based or contentbased [3]. Topic-based systems take into account the subject of messages in order to match publications with subscriptions. Content-based systems use filters to specify the value of subscriptions attributes to redirect notifications. A filter is a boolean function that depends on the set of subscriptions. In our proposal, we plan to deal with a content-based system that uses Bloom filters at broker nodes in order to save memory resources and speed up routing decisions. Sensor networks frequently use tiny devices with limited battery capabilities that make unsuitable the use of a Global Positioning System (GPS) to disseminate information according to the coordinates of nodes. In addition to this, the use of virtual coordinates to substitute real coordinates requires the use of sinks or landmarks to structure the network. For these reasons, the use of coordinates in an unstructured sensing scenario is not recommended. We assume that we work in an unstructured scenario in which no routing protocol provides communication between the nodes of the network. The constraints of the network infrastructure lead us to the design of a network architecture for distributed event-based systems that must use as less resources as possible (i.e., battery, memory, etc.). In this paper, we present a solution that avoids implying all the nodes of the network in the dissemination process by using a distributed notification service defined by Directional Random Walks (DRWs). The rest of this paper is organized as follows: Section II analyzes the state of the art. Section III points out the approach to solve the problem specified in this section. Section IV
presents the research efforts already done for the approach specified in Section III. Section V details the process of construction of the proposed architecture. Section VI evaluates the performance of our solution using DRWs, comparing it with the use of Pure Random Walks (PRWs). Finally, Section VII summarizes our proposal. II. S TATE OF THE ART A. Distributed and Structured Event-based Systems Distributed and structured event-based systems use three layers on the top of a bottom layer (see Figure 2), which provides data link functionalities, to facilitate topology control: 1) The network layer is in charge of providing data forwarding between the different nodes involved in the network. A network protocol, such as the Multicast Ad-hoc On-demand Distance Vector (MAODV) [4] is needed to provide point-to-point communication. 2) The medium layer is called the overlay layer. It is a virtual layer that builds the event notification service by providing a network of brokers that redirect notifications to the corresponding subscribers. 3) Finally, on the top layer the event-based protocol is implemented.
Figure 2: Decomposition in layers of the typical design of a distributed and structured event-based system.
One strategy to construct the overlay layer is to use a tree. In TinyMQ [5], which is designed specifically for wireless sensor networks, a multi-tree overlay layer is maintained. Another strategy is to clusterize the network and use cluster heads to manage messages as in Mires [6], which is a middleware for sensor networks. The Gradient Landmark-Based Distributed Routing (GLIDER) [7] organizes the network using some defined landmarks to compute the Delaunay graph for network partition. Then, the Landmark-Based Information Brokerage scheme (LBIB) [8] uses an overlay layer based in GLIDER to match publishers with subscribers. A typical solution is to build the overlay layer using Distributed Hash Tables (DHTs). In these systems, a key is mapped to a particular node with storage location properties. In some DHT architectures, rendez-vous nodes depend on the node ID as in Pastry [9]. In others, as the Content Addressable Network (CAN) [10], a region of the space is used to map a key. Some efforts have been made to apply this solution to sensor networks [11]. When coordinates are available, sensor
networks use Geographic Hash Tables (GHT) instead of a typical DHT. Currently, technology companies as Ericsson Research, are making an effort to develop applications that use GHTs in wireless sensor networks [12]. B. Distributed and Unstructured Event-based Systems The main characteristics of distributed and unstructured event-based systems is that they do not maintain an overlay layer. This fact makes easier to deal with network changes. The distributed notification service may be built using flooding, gossiping or random walks. Most of the algorithms proposed deal with the unstructured nature of wireless communications using flooding to build a tree. A typical solution is to use the On-Demand Multicast Routing Protocol (ODMRP) [13], which is based on the forwarding group concept. Groups are constructed and maintained periodically when a multicast source has data to send. This task is done by broadcasting the entire network with membership information. An extension for ODMRP has been proposed [14] to adapt a content-based system by adding subscriptions to Bloom filters. Trees also may be configured to self-repair themselves in base to brokers dynamicity [15]. These solutions are reliable but increase the traffic of the network because they use flooding at some point. Flooding may also be used to continuously exchange subscription information clusterizing the network [16]. Then, notifications are sent to the appropriate cluster, improving the efficiency of the network. Other mechanisms can be used as the combination of a DHT and random walks [17]. Cluster heads manage the DHTs while random walks help to connect the different cluster heads of the network. The cluster concept in the network of brokers can be improved in a dynamic scenario by enriching the topology management with predictions based on location [18]. 1) Probabilistic approaches: Probabilistic approaches are suitable to deal with dynamicity but they do not offer reliability. Some solutions propose that all the nodes in the network implement a broker that forwards messages to neighbors depending on the estimation of potential subscribers [19]. Other solutions [20], propose to flood subscriptions in a small area and then use random walks to reach these areas. In Quasar [21], subscriptions of a certain area are able to attract or reject notifications, that are propagated with a random walk, using an attenuated Bloom filter [22]. A probabilistic solution that uses a random walk specifically designed to go deep into the network is CoQUOS (Continous Queries on Unstructured OverlayS) [23]. Continuous queries are launched to the network using random walks. Peers compute the overlap between their neighbor lists and use this information to forward the random walk to avoid remaining in a cluster. Then, some peers register the query with a probability that depends on the number of hops. III. N ETWORK ARCHITECTURE Due to the unstructured nature of our network, we propose the development of a dissemination algorithm that merges the network and the overlay layers of a typical distributed and structured event-based system (see Figure 2). This means that no other network protocol is needed. The main advantage of not using another network protocol is that there is no necessity of maintaining a network topology. This implies that most nodes of the network, which do not actively participate
in the process of dissemination, do not have to keep any information about topology. The main consequence is that nodes not involved in the system are able to save energy and computing resources. Our design (see Figure 3) uses two layers on the top of a bottom layer that provides data link functionalities: 1) The overlay layer is in charge of providing the distributed network of brokers and, at the same time, provides point-to-point communication between publishers and subscribers. The main objective of this strategy is to avoid the use of global information of the network, which is costly to get and maintain. 2) As in Figure 2, the event-based protocol is implemented at the top layer.
to go forward when adding more nodes to the DRW. The general algorithm for a tabu search based on a neighborhood method is the following: Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7
Set initial solution St where t = 0. Add St to the tabu list. Update the current number of iteration t = t+1. Create the solution neighborhood N (St ) discarding nodes that are part of the tabu list. If N (St ) = ∅ then consider St−1 and return to Step 3. If N (St ) 6= ∅ then evaluate the cost function for all N (St ). Select the best solution St+1 basing the choice on the minimum cost. Add St+1 to the tabu list. Stop the algorithm if the stopping criterion is satisfied. Otherwise, return to Step 2.
A tabu list needs a stopping condition. In our design, the condition is referred to an intersection with a node that is already part of another DRW in the network.
Figure 3: Decomposition of the architecture of our design in layers.
As Section I mentions, we assume that a node can be a publisher, a subscriber, a broker or a combination of these three possibilities. Moreover, our design takes advantage of some nodes in the network that want to collaborate. Nodes that participate in the system are considered as part of the overlay layer (blue path of Figure 3). The overlay layer is formed by the intersection of different publishers and subscribers (blue nodes). Publishers and subscribers implement a DRW until intersecting other DRW. Broker nodes (yellow nodes) are the meeting point between two DRWs. A DRW is a probabilistic technique able to go forward into the network following a loop-free path. The principle assumed in this strategy is that two lines in a plane cross (see Figure 4). It is unclear how to construct a straight path of relaying nodes in ubiquitous unstructured networks without requiring global information and without making use of geo-coordinates. In this research, two different methods have been proposed in order to build DRWs [24][25]. The strategy followed by the DRW is based on a tabu search [26]. The tabu search is a technique used when difficult optimization problems arise. Unfortunately, the theoretical aspects related to a tabu search are so complicated that there is no formal proof of the convergence of the algorithm. By definition, a tabu search is an iterative procedure in which the next solution is defined by the current solution and a tabu list. A tabu list is a memory that keeps information about the previous iterations of the algorithm. It is used to select the optimal solution for the next iteration. In neighborhood search methods, the tabu list is referred to the set of neighbors of the actual solution. The design of a DRW uses a technique, which is similar to a tabu list based on a neighborhood search method. A DRW marks the closest nodes of nodes that are already part of the DRW. Afterwards, this information is used
Figure 4: Directional random walks intersecting using a Java simulator.
The matching of publishers and subscribers will be done using a special architecture of Bloom filters [22] implemented at broker nodes. It is remarkable to mention that in our eventbased system no advertisement table is required because filters only manage information about subscriptions. Bloom filters are probabilistic data structures that efficiently manage membership of a certain number of elements. The content related to membership is hashed using different hashing algorithms. Then, the positions of the Bloom structure corresponding to the hashes are set to one. The maximum number of elements to be inserted to the filter is fixed in order to maintain a certain probability of false positives. When searching for elements of a certain membership, the corresponding positions of the data structure are checked. The main advantage of Bloom filters is that they do not require much memory space and processing resources; so its use is very convenient in a sensing scenario in which devices have limited capabilities. In this research, we concentrate on the study of the properties of the overlay layer proposed. It is out of the scope of this work to study a more efficient architecture of Bloom filters at broker nodes for matching publications with subscriptions.
IV. BACKGROUND In this section, we present the efforts already made in order to build DRWs. Based on [24], a first method to build DRWs is proposed. It is based on the addition of different nodes to the DRW by pre-computing different weights at each node that take into account the two hops path. A weight is defined as follows: nyxz = | N (x) ∩ N (z) |
(1)
where y is the last node added to the DRW; x is the penultimate node added to the DRW; z can be any node of the set N (y) and N (a) is the set of neighbor nodes of node a. Furthermore, in this method, a penalty is added to the weight when a node is added to the DRW. Some properties about our heuristics were found using extensive simulations. The first property claims that DRWs decrease the time to intersection compared to pure random walks. The second property states that cooperation also decreases the time to intersection. Cooperation refers to synchronicity between publishers and subscribers. Finally, it is shown that DRWs are good at balancing the load of the network. Based on [25], a second method to build DRWs is proposed. The main difference with the first design presented for DRWs is that nodes of the first and second neighborhoods of nodes added to the DRW are marked. In addition to this, the cost is not pre-computed, but it is computed when selecting a node as follows: c(v) = α|N (v) ∩ N (DRW )| + β|N (v) ∩ N 2 (DRW )| (2) where α and β are parameters used as weights; v can be any node of the set related to the neighborhood of the last node added to the DRW; DRW is the set of nodes that are part of the DRW; N (a) is the set of neighbor nodes of node a and N 2 (DRW ) is the set of neighbor nodes of N (DRW ). In the first part of this research, the properties associated with a DRW were assessed. Implementations of DRWs of one or two branches were studied. The main results show that the use of one branch is as efficient as the use of two branches. Moreover, it is shown that the use of second neighborhoods to forward the DRW does not improve the Euclidean distance traversed in the network. It is also shown that shorter paths are obtained when using higher densities of nodes in the network. In the second part of this research, an information brokerage system was evaluated using a double ruling method. As in the first paper, it is shown that the algorithm is efficient at balancing the load using a few nodes of the network. In fact, we can state that the method proposed is as good as a traditional Rumor Routing algorithm [27] with an infinite memory. V. D ESIGN OF THE OVERLAY LAYER A. Network Model A DRW is defined in a graph G = (V, E), where V is the set of vertices and E is the set of edges. u, v ∈ V are connected u ∼ v if (u, v) ∈ E. The size of G is denoted by | V |= n and the number of edges is denoted by | E |= m. We denote the neighborhood of v as N (v) = {u ∈ V | u ∼ v}. B. Implementation of the overlay layer In order to assess the architecture proposed, we have used a variation of the algorithm presented at [25].
The set of edges and vertices associated to a DRW of ID x are denoted by Ex0 and Vx0 . Our technique consists of selecting the set of vertices Vx0 that are part of the DRW. Each vertex 0 of Vx0 is denoted by vx,i . The current number of nodes in the active path of the DRW is denoted by i. Vertices are chosen consecutively until two DRWs intersect. 0 A vertex v is selected to be part of the DRW as vx,i if it 0 has the minimum cost at iteration i between N (vx,i−1 ). The cost function used is a varitation of the cost function used in (2): c(v) = |N (v) ∩ N (DRWx,i )| (3) where N (DRWx,i ) denotes the set of neighbors of Vx0 at iteration i. Formally, it is defined as: i [ 0 N (vx,j ) (4) N (DRWx,i ) = j=0
The use of N (DRWx,i ) is of particular interest to our research because it allows us to exploit the broadcast advantage of the wireless medium. This process can be seen as a repulsion mechanism to force a branch to keep moving forward. The result of this mechanism is that neighbors that are not part of N (DRWx,i ) have higher possibilities to be added to the DRW. Figure 5 illustrates the selection of a node z when nodes x and y have already been added to a DRW. Before adding z to the DRW (see Figure 5.a), neighbors of the penultimate node added to the DRW are marked as part of the neighborhood of the walker. At this stage, node y has to select the next node to be added to the DRW between its neighbors a, b, c, d and z (see Figure 5.b). In order to avoid remaining in the same zone, we are interested in selecting a candidate that helps to push the DRW to other zones of the network. Candidate a has a cost of 3 because it has three neighbors marked as part of the neighborhood of the walker (see Figure 5.b). Candidates b, c, d, and z; have a cost of 2, 3, 2 and 1, respectively. Candidate z has the minimum cost, so that it is added to the DRW and neighbors of node y are marked as part of the neighborhood of the walker. Publishers and subscribers are considered as initiators of a DRW. Algorithm 1 shows how DRWs are intersected for a certain number of publishers and subscribers in the network. Algorithm 2 shows the pseudocode used for the construction of a DRW. The selection of a node is based on the computation of a cost (line 26). A candidate node is added to the DRW if it has the minimum cost between all the candidate nodes (line 30). A node is considered as candidate, if it is part of the neighborhood of the last node added to the branch (line 21). It is assumed that there are no candidate nodes when the neighborhood of the last node added is empty or all of them are already part of the DRW (line 18). In order to assure intersections our algorithm goes back in the DRW to search for the nearest non traversed neighbor. VI. E VALUATION OF THE NOVEL ARCHITECTURE To assess the performance of the overlay layer we have implemented a Java simulator. The networks used for the numerical evaluation have been obtained by placing nodes randomly and uniformly in a squared area of side size 1 × 1 with a range of communication of r = 0.05. The communication model is defined by the range of communication. Two
Algorithm 1 Construction of the overlay layer Require: N umber of total initiators : I 0 1: Define Thread drw0 as a new DRW(v0,1 ) 0 2: Define Thread drw1 as a new DRW(v1,1 ) 3: Start Thread drw0 4: Start Thread drw1 5: while{(Intersection value of drw0 is 0) && (Intersection value of drw1 is 0)} 6: end while 7: for i = 2; i < I; i + + do 0 ) 8: Define Thread drwi as a new DRW(vi,1 9: Start Thread drwi 10: while{(Intersection value of drwi is 0)} 11: end while 12: end for a) Two nodes added to the directional random walk
Algorithm 2 Thread of the construction of a DRW 0 Require: Initiator : vx,1 ∈V 0 1: function DRW(vx,1 ) 2: Intersection = 0 0 3: add vx,1 to Vx0 0 4: if any v ∈ N (vx,1 ) is part of other DRW then 5: return Intersection = 1 6: else 0 7: if any v ∈ N (vx,1 ) is part of other DRW then 0 8: vx,2 ← v 9: return Intersection = 1 10: else 0 0 11: select vx,2 ∈ N (vx,1 ) randomly 12: i = 2; 13: while Intersection = 0 do 0 14: for each v ∈ N (vx,i−1 ) do 0 15: add v to N (vx,i ) 16: end for 17: i + +; 0 18: while ({v | v ∈ N (vx,i )} = ∅) || 0 ({v | v ∈ N (vx,i )} ∈ DRW ) do 19: i − −; 20: end while 0 21: for each v ∈ N (vx,i ) do 22: if v is part of other DRW then 0 23: vx,i ←v 24: return Intersection = 1 25: else 26: compute c(v) as defined by (3) 27: end if 28: end for 29: if Intersection = 0 then 0 30: add to the DRW v | v, min{c(v)} ∈ N (vx,i ) 31: end if 32: end while 33: return Intersection = 1 34: end if 35: end if 36: end function
b) Three nodes added to the directional random walk Figure 5: Construction of a directional random walk.
nodes that are closer than the range of communication can communicate. The graph we obtain in this way is often referred by Unit Disc Graph (UDG). Under these conditions, it is hard to obtain connected networks with less than 1.000 nodes, so we have conducted numerical validation for more dense networks assuring that they are completely connected. The total number of nodes considered has been 1.000, 2.000 and 3.000. As previously mentioned, for the implementation of the overlay layer we use different DRWs that intersect. Figure 6 shows a simulation of the overlay layer in which yellow squares represent the distributed network of brokers while publishers and subscribers are represented using green circles. The performance metric used is the depth (see Figure 7 and (5)). The depth compares the maximum Euclidean distance reached by all the nodes that are part of the list of relaying nodes of any DRW, with the maximum Euclidean distance that can be reached in the network. It is defined as: S max{{d(vi0 , vj0 ) | vi0 , vj0 ∈ x Vx0 } depth(Overlay Layer) = max{d(vi , vj ) | vi , vj ∈ V } (5)
1.250, 1.500 and 1.750. Finally, for networks of 3.000 nodes 22.000 simulations have been conducted for a total number of initiators of: 2, 3, 4, 5, 6, 7, 8, 9, 10, 20, 30, 40, 50, 75, 100, 250, 500, 1.000, 1.500, 1.875, 2.250 and 2.625. Moreover, we have used PRWs for comparison with our method, which select the next node of the walker randomly. So that overlay layers formed by PRW have also been evaluated for 1.000, 2.000 and 3.000 nodes.
Figure 6: Overlay layer using directional random walks in a Java simulator.
where d denotes the Euclidean distance.
Figure 7: Representation of the depth.
The evaluation of the design of the overlay layer is based on: • The number of nodes in the active path. • The depth. For this purpose, we assess the performance of the architecture proposed for different number of publishers and subscribers in the network. Our results, have been obtained by using extensive simulations for each network considered. Box and whisker plots are used to visualize data. As previously mentioned, we considered networks of 1.000, 2.000 and 3.000 nodes. The total number of networks simulated totals 126.000. The total number of simulations when evaluating networks of 1.000 nodes has been 20.000. We have evaluated the performance of the overlay layer for the following total number of publishers and subscribers: 2, 3, 4, 5, 6, 7, 8, 9, 10, 20, 30, 40, 50, 75, 100, 250, 500, 625, 750 and 875. For each total number of initiators, we have simulated 100 different networks. Similarly, for networks of 2.000 nodes we have obtained 21.000 simulations using a total number of initiators of: 2, 3, 4, 5, 6, 7, 8, 9, 10, 20, 30, 40, 50, 75, 100, 250, 500, 1.000,
A. Impact on the number of nodes in the active path Figure 8 compares the results obtained by using DRWs and PRWs for networks of 1.000, 2.000 and 3.000 nodes. Interestingly, Figures 8.a, 8.c and 8.e, that show the performance of the overlay layer when using DRWs are proportionally, almost identical for different densities of nodes in the network following the same logarithmic behavior. This behavior suggests that the base of the logarithm decreases as the density of the network is increased. Nevertheless, Figures 8.b, 8.d and 8.f, that show the performance of the overlay layer when using PRWs, present a different logarithmic behavior. We observe that proportionally, less dense networks grow faster in terms of nodes in the active path; but still, the more nodes we have in the network, the more nodes we have in the active path. This means that as in the previous case, the base of the logarithm decreases as the density of the network is increased; but the change on the base is more dramatic for DRWs. This effect is produced because DRWs reduce the random component attached to the experiment, allowing to have a more predictable performance, that is traduced in more directionality or similarity to a straight line of the walker. Besides this, overlay layers constructed using PRWs present more outliers that overlay layers that use DRWs. The result is that DRWs present a more reliable performance in the construction of the active path of our architecture. In addition to this, it is obvious, that overlay layers that use PRWs present larger active paths. As previously mentioned, in all cases the more nodes we have in the network, the more nodes we have in the active path of the overlay layer for the same number of publishers and subscribers in the network. This consequence is reasonable, because the less density of nodes we have in the network, the less candidate nodes we have to construct the walker. The result of this performance is that less dense networks are saturated before. B. Impact on the depth Figure 9 shows the resulting depth for the different densities of networks considered using DRWs and PRWs. The main conclusion extracted is that depths are very similar for all cases and that the maximum Euclidean distance that is going to be traversed in the network is reached very early. Figure 10 shows in detail the performance when having a few number of publishers and subscribers in the network. In all cases, the depth is importantly increased when having three publishers and subscribers in the network. Furthermore, we observe that the directionality of DRWs leads to increase the depth when having two publishers or subscribers compared to the depth reached by PRWs. Finally, we can state that there exists no correlation between the number of nodes in the active path and the depth. So that other factors, as the density of the network, have more impact in the number of nodes of the active path.
a)
b)
c)
d)
e)
f)
Figure 8: Nodes in the active path of the overlay layer for different number of publishers/subscribers in the network using directional random walks (a, c, e) and pure random walks (b, d, f). The total number of nodes in the network is 1.000 nodes (a, b), 2.000 nodes (c, d) and 3.000 nodes (e,f).
a)
b)
c)
d)
e)
f)
Figure 9: Depth of the overlay layer for different number of publishers/subscribers in the network using directional random walks (a, c, e) and pure random walks (b, d, f). The total number of nodes in the network is 1.000 nodes (a, b), 2.000 nodes (c, d) and 3.000 nodes (e,f).
a)
b)
c)
d)
e)
f)
Figure 10: Depth of the overlay layer, for the first nodes in the active path, for different number of publishers/subscribers in the network using directional random walks (a, c, e) and pure random walks (b, d, f). The total number of nodes in the network is 1.000 nodes (a, b), 2.000 nodes (c, d) and 3.000 nodes (e,f).
VII. C ONCLUSION In this paper, a novel network architecture for distributed event-based systems that use sensing devices has been proposed. We present a network architecture that merges the network and overlay layers of typical structured event-based systems. Our results, validated through extensive simulations, show that DRWs are suitable for the construction of an overlay layer that provides point-to-point communication and a distributed notification service. Our strategy avoids using other network protocol to provide point-to-point communication. This implies that most nodes of the network, which do not actively participate in the process of dissemination, do not have to maintain any information about topology. The main consequence is that nodes not involved in the system are able to save energy and computing resources. We evaluate the performance of the overlay layer using DRWs and PRWs for its construction. Our results show that for our purpose DRWs are more efficient than PRWs. This is due, mainly to the good properties of DRWs, which use less nodes of the network for the establishment of the active path of the overlay layer. Moreover, we can state that overlay layers that use DRWs have a more reliable performance that overlay layers that use PRWs. Furthermore, it is remarkable to mention that, in all cases, the more nodes we have in the network, the more nodes we have in the active path of the overlay layer for the same number of publishers and subscribers in the network. Finally, it is interesting to discard any correlation between the number of nodes that form the overlay layer and the maximum Euclidean distance that is traversed by the walkers; mainly because the maximum depth is quickly reached. ACKNOWLEDGMENT This work has been developed as part of the POPWiN project that is financially supported by the Swiss Hasler Foundation in its SmartWorld - Information and Communication Technology for a Better World 2020 program.
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
[18]
[19]
R EFERENCES [1]
[2]
[3] [4]
[5]
[6]
[7]
[8]
C. Mu˜noz and P. Leone, “A network architecture for distributed eventbased systems in an ubiquitous sensing scenario,” in Proc. 6th Intl. Conference on Future Computational Technologies and Applications, FUTURECOMPUTING, 2014, pp. 65–68. D. J. Cook and S. K. Das, “Review: Pervasive computing at scale: Transforming the state of the art,” Pervasive Mob. Comput., vol. 8, no. 1, Feb. 2012, pp. 22–35. G. M¨uhl, L. Fiege, and P. Pietzuch, ”Distributed Event-Based Systems”. Secaucus, NJ, USA: Springer-Verlag New York, Inc., 2006. S. Roy, V. Addada, S. Setia, and S. Jajodia, “Securing maodv: attacks and countermeasures,” in Sensor and Ad Hoc Communications and Networks, 2005. IEEE SECON. Second Annual IEEE Communications Society Conference on, Sept 2005, pp. 521–532. K. Shi, Z. Deng, and X. Qin, “Tinymq: A content-based publish/subscribe middleware for wireless sensor networks,” in SENSORCOMM 2011, The Fifth International Conference on Sensor Technologies and Applications, 2011, pp. 12–17. E. Souto et al., “Mires: a publish/subscribe middleware for sensor networks,” Personal and Ubiquitous Computing, vol. 10, no. 1, 2006, pp. 37–44. Q. Fang, J. Gao, L. J. Guibas, V. Silva, and L. Zhang, “Glider: Gradient landmark-based distributed routing for sensor networks,” in in Proc. of the 24th Conference of the IEEE Communication Society INFOCOM, 2005, pp. 339–350. Q. Fang, J. Gao, and L. J. Guibas, “Landmark-based information storage and retrieval in sensor networks,” in In The 25th Conference of the IEEE Communication Society INFOCOM, 2006, pp. 1–12.
[20]
[21]
[22]
[23]
[24]
[25]
[26] [27]
A. I. T. Rowstron and P. Druschel, “Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems,” in Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, ser. Middleware ’01. London, UK, UK: Springer-Verlag, 2001, pp. 329–350. S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, “A scalable content-addressable network,” in Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, ser. SIGCOMM. New York, NY, USA: ACM, 2001, pp. 161–172. G. Fersi, W. Louati, and M. Ben Jemaa, “Distributed hash table-based routing and data management in wireless sensor networks: a survey,” Wirel. Netw., vol. 19, no. 2, Feb. 2013, pp. 219–236. H. Mahkonen, T. Jokikyyny, J. Jim´enez, and S. Kukli´nski, “M3: Machine-to-machine management framework,” in Proc. 3rd Intl. Conference on Sensor Networks, SENSORNETS, 2014, pp. 139–144. S. J. Lee, W. Su, and M. Gerla, “On-demand multicast routing protocol in multihop wireless mobile networks,” Mob. Netw. Appl., vol. 7, no. 6, Dec. 2002, pp. 441–453. E. Yoneki and J. Bacon, “An adaptive approach to content-based subscription in mobile ad hoc networks,” in Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, ser. PERCOMW. Washington, DC, USA: IEEE Computer Society, 2004, pp. 92–97. L. Mottola, G. Cugola, and G. P. Picco, “A self-repairing tree topology enabling content-based routing in mobile ad hoc networks,” IEEE Transactions on Mobile Computing, 2008, pp. 946–960. S. Voulgaris, E. Rivire, A.-M. Kermarrec, and M. V. Steen, “Sub-2sub: Self-organizing content-based publish subscribe for dynamic large scale collaborative networks,” in In the fifth International Workshop on Peer-to-Peer Systems, IPTPS, 2006. R. Tian et al., “Hybrid overlay structure based on random walks,” in Proceedings of the 4th international conference on Peer-to-Peer Systems, ser. IPTPS. Berlin, Heidelberg: Springer-Verlag, 2005, pp. 152–162. F. Abdennadher and M. Ben Jemaa, “Accurate prediction of mobility into publish/subscribe,” in Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, ser. MOBIWAC. ACM, 2013, pp. 101–106. J. Haillot and F. Guidec, “Content-based communication in disconnected mobile ad hoc networks,” in Proceedings of the 8th international conference on New technologies in distributed systems, ser. NOTERE. New York, NY, USA: ACM, 2008, pp. 21:1–21:12. P. Costa and G. Picco, “Semi-probabilistic content-based publishsubscribe,” in Distributed Computing Systems, ICDCS. Proceedings. 25th IEEE International Conference on, 2005, pp. 575–585. B. Wong and S. Guha, “Quasar: a probabilistic publish-subscribe system for social networks,” in Proceedings of the 7th international conference on Peer-to-peer systems, ser. IPTPS. Berkeley, CA, USA: USENIX Association, 2008, pp. 2–2. S. Tarkoma, C. Rothenberg, and E. Lagerspetz, “Theory and practice of bloom filters for distributed systems,” Communications Surveys Tutorials, IEEE, vol. 14, no. 1, First 2012, pp. 131–155. L. Ramaswamy and J. Chen, “The coquos approach to continuous queries in unstructured overlays,” IEEE Trans. on Knowl. and Data Eng., vol. 23, no. 3, Mar. 2011, pp. 463–478. P. Leone and C. Mu˜noz, “Content based routing with directional random walk for failure tolerance and detection in cooperative large scale wireless networks,” in Proc. 2nd Intl. Workshop on Architecting Safety in Collaborative Mobile Systems, SAFECOMP, 2013, pp. 313–324. C. Mu˜noz and P. Leone, “Design of an unstructured and free geocoordinates information brokerage system for sensor networks using directional random walks,” in Proc. 3rd Intl. Conference on Sensor Networks, SENSORNETS, 2014, pp. 205–212. M. Gendreau and J.-Y. Potvin, “Tabu search,” in Search Methodologies. Springer, 2014, pp. 243–263. D. Braginsky and D. Estrin, “Rumor routing algorthim for sensor networks,” in Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications, ser. WSNA. New York, NY, USA: ACM, 2002, pp. 22–31.